
Cloud Vulnerability DB
A community-led vulnerabilities database
Xen Orchestra, with xo-web through version 5.80.0 and xo-server through version 5.84.0, contains a critical authorization bypass vulnerability in its WebSocket implementation. The vulnerability was discovered on April 5, 2021, and affects the permission enforcement mechanism through WebSockets, allowing unprivileged users to escalate their privileges (GitHub Issue, NVD).
The vulnerability stems from improper authorization handling in the WebSocket API implementation. Specifically, the application relies on client-side permission responses that can be manipulated. When using the 'resourceSet.getAll' method, the API responds with a permission level that can be modified from 'none' to 'admin' on the client side. This modification persists through subsequent API calls until the resourceSet.getAll method is called again (GitHub Issue).
The vulnerability allows an unprivileged user with basic access to elevate their permissions and gain unauthorized access to sensitive data sets including VMs, Backups, Audit logs, Users, and Groups information. This represents a significant breach of access control and data confidentiality (CISA).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."